Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Subil M. Abraham is active.

Publication


Featured researches published by Subil M. Abraham.


international conference on e-business engineering | 2005

Enhancing Web services availability

Subil M. Abraham; Mathews Thomas; Johnson P. Thomas

Little work has been reported on highly available Web services which are essential for mission critical applications. In this paper we propose architecture for highly available Web services for mission critical applications. The central idea is the enhancement of Web services by the introduction of a central hub to increase the availability of Web services


2015 IEEE 2nd International Conference on Cybernetics (CYBCONF) | 2015

Exploitability analysis using predictive cybersecurity framework

Subil M. Abraham; Suku Nair

Managing Security is a complex process and existing research in the field of cybersecurity metrics provide limited insight into understanding the impact attacks have on the overall security goals of an enterprise. We need a new generation of metrics that can enable enterprises to react even faster in order to properly protect mission-critical systems in the midst of both undiscovered and disclosed vulnerabilities. In this paper, we propose a practical and predictive security model for exploitability analysis in a networking environment using stochastic modeling. Our model is built upon the trusted CVSS Exploitability framework and we analyze how the atomic attributes namely Access Complexity, Access Vector and Authentication that make up the exploitability score evolve over a specific time period. We formally define a nonhomogeneous Markov model which incorporates time dependent covariates, namely the vulnerability age and the vulnerability discovery rate. The daily transition-probability matrices in our study are estimated using a combination of Freis model & Alhazmi Malaiyas Logistic model. An exploitability analysis is conducted to show the feasibility and effectiveness of our proposed approach. Our approach enables enterprises to apply analytics using a predictive cyber security model to improve decision making and reduce risk.


trust, security and privacy in computing and communications | 2015

A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov Models

Subil M. Abraham; Suku Nair

Evaluating the security of an enterprise is an important step towards securing its system and resources. However existing research provide limited insight into understanding the impact attacks have on the overall security goals of an enterprise. We still lack effective techniques to accurately measure the predictive security risk of an enterprise taking into account the dynamic attributes associated with vulnerabilities that can change over time. It is therefore critical to establish an effective cyber-security analytics strategy to minimize risk and protect critical infrastructure from external threats before it even starts. In this paper we present an integrated view of security for computer networks within an enterprise, understanding threats and vulnerabilities, performing analysis to evaluate the current as well as future security situation of an enterprise to address potential situations. We formally define a non-homogeneous Markov model for quantitative security evaluation using Attack Graphs which incorporates time dependent covariates, namely the vulnerability age and the vulnerability discovery rate to help visualize the future security state of the network leading to actionable knowledge and insight. We present experimental results from applying this model on a sample network to demonstrate the practicality of our approach.


The Journal of Defense Modeling and Simulation | 2018

Comparative analysis and patch optimization using the cyber security analytics framework

Subil M. Abraham; Suku Nair

Dependable metrics are one of the critical elements of an organization’s information security program and are crucial for its long-term success. Current research in the area of enterprise security metrics provides limited insight on understanding the impact that attacks have on the overall security goals of an enterprise as well as predicting the future security state of the network. In this paper we present a novel security analytics framework that takes into account both the inter-relationship between different vulnerabilities and the temporal features that evolve over time, such as the vulnerability discovery rate and the lifecycle events. We then formally define a non-homogenous stochastic model that incorporates time dependent covariates, namely the vulnerability age and the vulnerability discovery rate, to help visualize the future security state of the network leading to actionable knowledge and insight. We will perform a comparative analysis and also describe the patch optimization methodology by applying this model on a sample network to demonstrate the practicality of our approach.


IEEE Systems Journal | 2013

State Machine-Based Security Fusion for Resource-Constrained Environments

Suku Nair; Omar Al Ibrahim; Subil M. Abraham

A growing range of devices has difficulty in implementing strong cryptographic algorithms. Radio frequency IDs and sensors, for instance, generally lack the processing power and memory to perform these operations in an efficient and timely manner. Recently, a new paradigm in security, called security fusion, was introduced for resource-constrained environments. In this approach, strong security properties are synthesized from weaker point-to-point properties, thereby minimizing the resource requirements at each node without compromising system-level security. In this paper, we describe a state machine-based architecture and pertinent protocols to realize security fusion. Furthermore, we analyze these protocols for their security capabilities.


Archive | 2005

Method and system for enhancing user security and session persistence

Subil M. Abraham; Tam M. Cao; Jason A. Gonzalez; Adam A. Nemati; Mathews Thomas


Archive | 2004

Method and system to enhance web-based shopping collaborations

Subil M. Abraham; James P. Appleyard; Jason A. Gonzalez; Mathews Thomas


Archive | 2005

Enhancing web experiences using behavioral biometric data

Subil M. Abraham; Jason A. Gonzalez; Hung Tack Kwan; Mathews Thomas


Archive | 2010

Method, medium, and system for allocating a transaction discount during a collaborative shopping session

Subil M. Abraham; Rajaraman Hariharan; Ramakrishnan Kannan; Mathews Thomas


Archive | 2006

Communicating using collaboration spaces

Subil M. Abraham; Tsz S. Cheng; Daniel Hassell; Mathews Thomas

Collaboration


Dive into the Subil M. Abraham's collaboration.

Researchain Logo
Decentralizing Knowledge